Module 5 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
welcome to less than 5.8. Let's just summarise what we learned here in this fifth module.
00:06
We discussed the test and release portion. Uh, we're running in our pipeline, and I took a look at some of the dass tools or capabilities. What for? Scanning the applications. Demo Jenkins. We had a dass to our pipeline, so it's getting a lot more mature now.
00:24
And we looked at maturing the delivery phase specific to the OAS deficit cops maturity model.
00:30
I looked at the I asked tools integrating them into your application, or at least in the development phase,
00:38
and then looked at their capabilities and then actually demoed it. And we saw what it looks like from the console of of a tool of re application actually getting attacked by a dash tool and what the voter or the reporting looks like. And then we compared the S ea from the I s tool
00:55
and the what We ran into pipeline just to see
00:59
what, what what we may have missed.
01:03
Here's a quick quiz I asked. Tool can replace the need for a desk and SAS scanners. Is this true or false?
01:11
Says this fall, says we mentioned? I asked. Tool has similar capabilities. Work unstick as assassin. The third party, the S E. A scanner, but it could only monitor attack. You need the dynamic tool to actually run against it to generate for it to see these patterns and identify vulnerabilities.
Up Next
Instructed By
Similar Content